Data Exfiltration Mechanisms
Aditya K. Sood,R. Enbody
2014 · DOI: 10.1016/B978-0-12-800604-7.00005-X
0 Citations
TLDR
This chapter covers the different data exfiltration mechanisms opted by attackers to extract data from infected systems using different transmission methods such as encryption, compression over different protocol channels such as HTTP/HTTPS, Peer-to-Peer (P2P), and Internet Relay Chat (IRC).
Cited Papers
Citing Papers
